Sunday -

Target Enumeration:

OS: Solaris


User: a3d9498027ca5187ba1793943ee8a598

Root: fb40fab61d99d37536daeec0d97af9b8

Ports / Services / Software Versions Running

79/tcp open finger

111/tcp open rpcbind

22022/tcp open ssh

33556/tcp open

49596/tcp open

Vulnerability Exploited:

User enumeration with Finger

SSH bruteforce gives the password sunday for the user

Crack shadow file to login as other user sammy

Privilege Escalation:

User sammy is allowed to use wget as root

Overwrite the sudoers file to get root

Exploiting the host:


Finger the host to get a user who is logged in:

Bruteforce the account with a small wordlist

Login to the account and start enumerating the system.

There is a folder called backup in the root dir with a copy of the shadow files:

Unshadow the file to get the hashes

Now crack with john and rockyou.

Login as the user sammy with the password cooldude!

Find your user.txt

Cat the file to get the flag.

Sudo -l gives you

We can overwrite files with wget so to exploit create a file locally and host it with python called sudoers with the contents


Once downloaded you have overwritten the sudoers file so all that remains is to sudo su to get root.

Last updated